There are no spectators anymore. Participate.

April 30, 2009

"I just read parts of the US Army Manual, FM34-60 COUNTERINTELLIGENCE
( I have way too much time on my hands), and a thought occurred to me.
We all have, or should have, firewalls for our personal computers,
passwords for our banking and communication over the internet, etc. But
what about consumer tools that have been specifically designed to act
as “countermarketing” aids? And if they exist, what do they look like,
how are they configured, and managed? It may be a bit of a stretch to
visualize, but for me, it might mean that I can begin to manage how I
want various companies to incorporate my internet behavior into their
computerized marketing machinery. Imagine the possibilities. If enough
people used such a tool, it might even force companies to do the hard
work. Actually get to know me." (emphasis added)

Now, I do a fair amount of this currently, primarily by trying to use plus addressing on my email address whenever possible in order to know who is selling my email address to whom. (Plus addressing allows me to determine the source of the leak.)

April 29, 2009

"Advertisers should not make the mistake of trying to recreate classic
Web advertising models that gather metrics like impressions and
click-throughs...a better strategy is to create great branded mobile experiences that
drive interactive usage and brand awareness. Successful brands have
leveraged mobile to extend their overall brand equity, not necessarily
to turn on a new revenue stream in the mobile channel." - Dave Sloan

As with earlier VRM gatherings, the purpose of the workshop is to
bring people together and make progress on any number of VRM topics and
projects. The workshop will be run as an "unconference" on the open
space model, which means session topics will be chosen by participants.
Here is the Wikipedia page on open space.

In open space there are no speakers or panels -- just participants,
gathered to get work done and enjoy doing it. Participation includes
contributing to the VRM Workshop 2008 wiki.

The workshop is scheduled to come just ahead of the Internet Identity Workshop (IIW2009a)
in Mountain View (a couple miles away), which takes place on
Monday-Wednesday, May 18-20. Many of the people involved in VRM are
also involved in the user-driven identity community.

April 16, 2009

There's historically been a separation between businesses that sell directly to end customers ("business to consumer," or B2C) like Best Buy or Wal*Mart, and businesses that sell primarily to other businesses ("business to business," or B2B) like IBM or a large automotive component supplier.

April 02, 2009

Solid article about one of the cornerstones of the VRM initiative, that of taking control of the data that is currently floating around about us in various systems, both financial and vendor-based. The lede:

"The idea of you 'owning' the data about yourself is both emotionally and intellectually appealing. This data, which ranges from the critical (your medical and financial records) to the theoretically trivial (what you buy and search for, and which Web sites you visit) defines, quantifies and describes your preferences, resources, habits and health. It is a proxy for you. It is also what every marketer in the entire commercial universe wants to get their hands on."